Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.561462] ==================================================================
[   30.561614] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.561674] Write of size 1 at addr fff00000c6025f00 by task kunit_try_catch/177
[   30.561753] 
[   30.562203] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.562349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.562376] Hardware name: linux,dummy-virt (DT)
[   30.562437] Call trace:
[   30.562477]  show_stack+0x20/0x38 (C)
[   30.562544]  dump_stack_lvl+0x8c/0xd0
[   30.562734]  print_report+0x118/0x608
[   30.562951]  kasan_report+0xdc/0x128
[   30.563013]  __asan_report_store1_noabort+0x20/0x30
[   30.563116]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.563185]  kunit_try_run_case+0x170/0x3f0
[   30.563242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.563480]  kthread+0x328/0x630
[   30.563529]  ret_from_fork+0x10/0x20
[   30.563717] 
[   30.563737] Allocated by task 177:
[   30.563765]  kasan_save_stack+0x3c/0x68
[   30.564061]  kasan_save_track+0x20/0x40
[   30.564108]  kasan_save_alloc_info+0x40/0x58
[   30.564145]  __kasan_kmalloc+0xd4/0xd8
[   30.564184]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.564222]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.564260]  kunit_try_run_case+0x170/0x3f0
[   30.564299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.564342]  kthread+0x328/0x630
[   30.564374]  ret_from_fork+0x10/0x20
[   30.564420] 
[   30.564452] The buggy address belongs to the object at fff00000c6024000
[   30.564452]  which belongs to the cache kmalloc-8k of size 8192
[   30.564520] The buggy address is located 0 bytes to the right of
[   30.564520]  allocated 7936-byte region [fff00000c6024000, fff00000c6025f00)
[   30.564581] 
[   30.564601] The buggy address belongs to the physical page:
[   30.564634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020
[   30.564694] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.564755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.564806] page_type: f5(slab)
[   30.564844] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.564892] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.564963] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.565045] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.565113] head: 0bfffe0000000003 ffffc1ffc3180801 00000000ffffffff 00000000ffffffff
[   30.565187] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   30.565258] page dumped because: kasan: bad access detected
[   30.565298] 
[   30.565327] Memory state around the buggy address:
[   30.565367]  fff00000c6025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.565419]  fff00000c6025e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.565471] >fff00000c6025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.565508]                    ^
[   30.565570]  fff00000c6025f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.565627]  fff00000c6026000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.565664] ==================================================================

[   32.390428] ==================================================================
[   32.391166] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   32.391230] Write of size 1 at addr fff00000c65bdf00 by task kunit_try_catch/175
[   32.391279] 
[   32.391338] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.391595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.391901] Hardware name: linux,dummy-virt (DT)
[   32.391937] Call trace:
[   32.391959]  show_stack+0x20/0x38 (C)
[   32.392009]  dump_stack_lvl+0x8c/0xd0
[   32.392057]  print_report+0x118/0x608
[   32.392103]  kasan_report+0xdc/0x128
[   32.392170]  __asan_report_store1_noabort+0x20/0x30
[   32.392218]  kmalloc_big_oob_right+0x2a4/0x2f0
[   32.392265]  kunit_try_run_case+0x170/0x3f0
[   32.392314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.392367]  kthread+0x328/0x630
[   32.392588]  ret_from_fork+0x10/0x20
[   32.392638] 
[   32.392656] Allocated by task 175:
[   32.392684]  kasan_save_stack+0x3c/0x68
[   32.392844]  kasan_save_track+0x20/0x40
[   32.393093]  kasan_save_alloc_info+0x40/0x58
[   32.393146]  __kasan_kmalloc+0xd4/0xd8
[   32.393307]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.393377]  kmalloc_big_oob_right+0xb8/0x2f0
[   32.393420]  kunit_try_run_case+0x170/0x3f0
[   32.393646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.393728]  kthread+0x328/0x630
[   32.393806]  ret_from_fork+0x10/0x20
[   32.393860] 
[   32.393882] The buggy address belongs to the object at fff00000c65bc000
[   32.393882]  which belongs to the cache kmalloc-8k of size 8192
[   32.393939] The buggy address is located 0 bytes to the right of
[   32.393939]  allocated 7936-byte region [fff00000c65bc000, fff00000c65bdf00)
[   32.394153] 
[   32.394187] The buggy address belongs to the physical page:
[   32.394219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b8
[   32.394270] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.394445] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.394500] page_type: f5(slab)
[   32.394539] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.394765] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.394933] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122
[   32.395050] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   32.395098] head: 0bfffe0000000003 ffffc1ffc3196e01 00000000ffffffff 00000000ffffffff
[   32.395146] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   32.395197] page dumped because: kasan: bad access detected
[   32.395238] 
[   32.395257] Memory state around the buggy address:
[   32.395287]  fff00000c65bde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.395467]  fff00000c65bde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.395550] >fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395588]                    ^
[   32.395641]  fff00000c65bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395681]  fff00000c65be000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.395718] ==================================================================

[   22.587908] ==================================================================
[   22.588384] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   22.588667] Write of size 1 at addr ffff888102b9df00 by task kunit_try_catch/192
[   22.589147] 
[   22.589248] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.589299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.589324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.589346] Call Trace:
[   22.589361]  <TASK>
[   22.589380]  dump_stack_lvl+0x73/0xb0
[   22.589413]  print_report+0xd1/0x650
[   22.589435]  ? __virt_addr_valid+0x1db/0x2d0
[   22.589460]  ? kmalloc_big_oob_right+0x316/0x370
[   22.589480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.589515]  ? kmalloc_big_oob_right+0x316/0x370
[   22.589536]  kasan_report+0x141/0x180
[   22.589557]  ? kmalloc_big_oob_right+0x316/0x370
[   22.589583]  __asan_report_store1_noabort+0x1b/0x30
[   22.589606]  kmalloc_big_oob_right+0x316/0x370
[   22.589627]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   22.589649]  ? __schedule+0x10cc/0x2b60
[   22.589670]  ? __pfx_read_tsc+0x10/0x10
[   22.589692]  ? ktime_get_ts64+0x86/0x230
[   22.589717]  kunit_try_run_case+0x1a5/0x480
[   22.589751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.589775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.589797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.589818]  ? __kthread_parkme+0x82/0x180
[   22.589839]  ? preempt_count_sub+0x50/0x80
[   22.589862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.589886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.590116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.590141]  kthread+0x337/0x6f0
[   22.590160]  ? trace_preempt_on+0x20/0xc0
[   22.590185]  ? __pfx_kthread+0x10/0x10
[   22.590205]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.590228]  ? calculate_sigpending+0x7b/0xa0
[   22.590252]  ? __pfx_kthread+0x10/0x10
[   22.590273]  ret_from_fork+0x116/0x1d0
[   22.590291]  ? __pfx_kthread+0x10/0x10
[   22.590325]  ret_from_fork_asm+0x1a/0x30
[   22.590358]  </TASK>
[   22.590370] 
[   22.597468] Allocated by task 192:
[   22.597644]  kasan_save_stack+0x45/0x70
[   22.597836]  kasan_save_track+0x18/0x40
[   22.597968]  kasan_save_alloc_info+0x3b/0x50
[   22.598108]  __kasan_kmalloc+0xb7/0xc0
[   22.598246]  __kmalloc_cache_noprof+0x189/0x420
[   22.598474]  kmalloc_big_oob_right+0xa9/0x370
[   22.598782]  kunit_try_run_case+0x1a5/0x480
[   22.598989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.599205]  kthread+0x337/0x6f0
[   22.599334]  ret_from_fork+0x116/0x1d0
[   22.599543]  ret_from_fork_asm+0x1a/0x30
[   22.599814] 
[   22.599883] The buggy address belongs to the object at ffff888102b9c000
[   22.599883]  which belongs to the cache kmalloc-8k of size 8192
[   22.600348] The buggy address is located 0 bytes to the right of
[   22.600348]  allocated 7936-byte region [ffff888102b9c000, ffff888102b9df00)
[   22.601091] 
[   22.601191] The buggy address belongs to the physical page:
[   22.601430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b98
[   22.601864] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.602087] flags: 0x200000000000040(head|node=0|zone=2)
[   22.602261] page_type: f5(slab)
[   22.602422] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   22.602936] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   22.603277] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   22.603592] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   22.603818] head: 0200000000000003 ffffea00040ae601 00000000ffffffff 00000000ffffffff
[   22.604406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   22.604791] page dumped because: kasan: bad access detected
[   22.605016] 
[   22.605081] Memory state around the buggy address:
[   22.605280]  ffff888102b9de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.605642]  ffff888102b9de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.605971] >ffff888102b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.606174]                    ^
[   22.606282]  ffff888102b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.606767]  ffff888102b9e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.607257] ==================================================================

[   22.771118] ==================================================================
[   22.771632] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370
[   22.771983] Write of size 1 at addr ffff888101f55f00 by task kunit_try_catch/193
[   22.772525] 
[   22.772644] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.772699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.772712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.772734] Call Trace:
[   22.772750]  <TASK>
[   22.772771]  dump_stack_lvl+0x73/0xb0
[   22.772804]  print_report+0xd1/0x650
[   22.772827]  ? __virt_addr_valid+0x1db/0x2d0
[   22.772852]  ? kmalloc_big_oob_right+0x316/0x370
[   22.772873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.772899]  ? kmalloc_big_oob_right+0x316/0x370
[   22.772920]  kasan_report+0x141/0x180
[   22.772959]  ? kmalloc_big_oob_right+0x316/0x370
[   22.772985]  __asan_report_store1_noabort+0x1b/0x30
[   22.773008]  kmalloc_big_oob_right+0x316/0x370
[   22.773030]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   22.773052]  ? __schedule+0x10cc/0x2b60
[   22.773086]  ? __pfx_read_tsc+0x10/0x10
[   22.773108]  ? ktime_get_ts64+0x86/0x230
[   22.773134]  kunit_try_run_case+0x1a5/0x480
[   22.773162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.773184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.773206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.773227]  ? __kthread_parkme+0x82/0x180
[   22.773248]  ? preempt_count_sub+0x50/0x80
[   22.773272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.773297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.773320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.773399]  kthread+0x337/0x6f0
[   22.773421]  ? trace_preempt_on+0x20/0xc0
[   22.773446]  ? __pfx_kthread+0x10/0x10
[   22.773466]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.773490]  ? calculate_sigpending+0x7b/0xa0
[   22.773514]  ? __pfx_kthread+0x10/0x10
[   22.773535]  ret_from_fork+0x116/0x1d0
[   22.773554]  ? __pfx_kthread+0x10/0x10
[   22.773574]  ret_from_fork_asm+0x1a/0x30
[   22.773605]  </TASK>
[   22.773618] 
[   22.783799] Allocated by task 193:
[   22.784261]  kasan_save_stack+0x45/0x70
[   22.784479]  kasan_save_track+0x18/0x40
[   22.784775]  kasan_save_alloc_info+0x3b/0x50
[   22.785121]  __kasan_kmalloc+0xb7/0xc0
[   22.785358]  __kmalloc_cache_noprof+0x189/0x420
[   22.785642]  kmalloc_big_oob_right+0xa9/0x370
[   22.786015]  kunit_try_run_case+0x1a5/0x480
[   22.786244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.786496]  kthread+0x337/0x6f0
[   22.786910]  ret_from_fork+0x116/0x1d0
[   22.787311]  ret_from_fork_asm+0x1a/0x30
[   22.787883] 
[   22.787970] The buggy address belongs to the object at ffff888101f54000
[   22.787970]  which belongs to the cache kmalloc-8k of size 8192
[   22.788936] The buggy address is located 0 bytes to the right of
[   22.788936]  allocated 7936-byte region [ffff888101f54000, ffff888101f55f00)
[   22.789731] 
[   22.789818] The buggy address belongs to the physical page:
[   22.790327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f50
[   22.790731] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.791223] flags: 0x200000000000040(head|node=0|zone=2)
[   22.791705] page_type: f5(slab)
[   22.791866] raw: 0200000000000040 ffff888100042280 dead000000000100 dead000000000122
[   22.792509] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   22.792853] head: 0200000000000040 ffff888100042280 dead000000000100 dead000000000122
[   22.793298] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   22.793647] head: 0200000000000003 ffffea000407d401 00000000ffffffff 00000000ffffffff
[   22.794005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   22.794452] page dumped because: kasan: bad access detected
[   22.794673] 
[   22.794767] Memory state around the buggy address:
[   22.795055]  ffff888101f55e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.795601]  ffff888101f55e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.795965] >ffff888101f55f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.796298]                    ^
[   22.796585]  ffff888101f55f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.796936]  ffff888101f56000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.797207] ==================================================================